Methods of Multidimensional Aggregation of Time Series of Streaming Data for Cyber-Physical System Monitoring M. A. PoltavtsevaT. M. Andreeva OriginalPaper 28 February 2023 Pages: 829 - 837
Botnet Attack Detection Approach in IoT Networks T. M. TatarnikovaI. A. SikarevT. V. Timochkina OriginalPaper 28 February 2023 Pages: 838 - 846
Trust Evaluation Problems in Big Data Analytics A. A. GrushoN. A. GrushoE. E. Timonina OriginalPaper 28 February 2023 Pages: 847 - 851
Detecting Malicious Executable Files Based on Static–Dynamic Analysis Using Machine Learning R. A. OgnevE. V. ZhukovskiiA. N. Kiselev OriginalPaper 28 February 2023 Pages: 852 - 864
Bank Fraud Detection with Graph Neural Networks A. I. SergadeevaD. S. LavrovaD. P. Zegzhda OriginalPaper 28 February 2023 Pages: 865 - 873
Applying Distributed Ledger Technology to Auditing and Incident Investigation in Big Data Processing Systems M. A. PoltavtsevaV. A. Torgov OriginalPaper 28 February 2023 Pages: 874 - 882
Performance Evaluation of Antivirus Systems for Computer Networks V. G. AnisimovE. G. AnisimovV. P. Los’ OriginalPaper 28 February 2023 Pages: 883 - 887
Reactive and Proactive Methods for Database Protection against Logical Inference Attacks A. A. Poltavtsev OriginalPaper 28 February 2023 Pages: 888 - 897
Immunization of Complex Networks: Topology and Methods A. D. FatinE. Yu. Pavlenko OriginalPaper 28 February 2023 Pages: 898 - 905
Systematization of Cyber Threats to Large-Scale Systems with Adaptive Network Topology E. Yu. Pavlenko OriginalPaper 28 February 2023 Pages: 906 - 915
Generation of Synthetic Data for Honeypot Systems Using Deep Learning Methods V. D. DanilovT. D. OvasapyanD. A. Moskvin OriginalPaper 28 February 2023 Pages: 916 - 926
Mathematical Model of the Spread of Computer Attacks on Critical Information Infrastructure V. M. KrundyshevM. O. Kalinin OriginalPaper 28 February 2023 Pages: 927 - 933
Adversarial Machine Learning Protection Using the Example of Evasion Attacks on Medical Images E. A. RudnitskayaM. A. Poltavtseva OriginalPaper 28 February 2023 Pages: 934 - 941
Immunization of Complex Networks: System of Differential Equations and Dynamic Variation E. Yu. PavlenkoA. D. Fatin OriginalPaper 28 February 2023 Pages: 942 - 946
Authentication and Key Establishment in WSN Based on Key Predistribution N. N. Shenets OriginalPaper 28 February 2023 Pages: 947 - 956
Computer Network Clustering Methods in Cybersecurity Problems E. Yu. PavlenkoI. S. EremenkoA. D. Fatin OriginalPaper 28 February 2023 Pages: 957 - 963
Counteracting Information Threats Using Honeypot Systems Based on a Graph of Potential Attacks E. V. ZavadskiiD. V. Ivanov OriginalPaper 28 February 2023 Pages: 964 - 969
Intelligent Security Strategy Based on the Selection of the Computer and Neural Network Architecture V. N. RuchkinB. V. KostrovV. A. Fulin OriginalPaper 28 February 2023 Pages: 970 - 980
Using Information about Influencing Factors to Split Data Samples in Machine Learning Methods for the Purposes of Assessing Information Security I. S. LebedevM. E. Sukhoparov OriginalPaper 28 February 2023 Pages: 981 - 987
Two-Component Steganographic System for Embedding Information into Least Significant Bits of Audio Signals M. V. Shakurskiy OriginalPaper 28 February 2023 Pages: 988 - 993
Review and Comparison of Lightweight Modifications of the AES Cipher for a Network of Low-Power Devices O. I. BerezovskayaS. S. ChuprovE. R. Sadreev OriginalPaper 28 February 2023 Pages: 994 - 1006
Noise-Resistant Coding and Highly Undetectable Stegosystems – Is the Alliance Successful? V. N. KustovA. G. Krasnov OriginalPaper 28 February 2023 Pages: 1007 - 1015
Functional Model of Adaptive Network Topology of Large-Scale Systems Based on Dynamical Graph Theory E. Yu. Pavlenko OriginalPaper 28 February 2023 Pages: 1016 - 1024
Blockchain Technology in 5G Networks: Performance Comparison of Private and Public Blockchains I. R. FedorovA. V. PimenovS. V. Bezzateev OriginalPaper 28 February 2023 Pages: 1025 - 1029
Noise-Immune Marking of Digital Audio Signals in Audio Stegosystems with Multiple Inputs and Multiple Outputs M. V. Gofman OriginalPaper 28 February 2023 Pages: 1030 - 1039
Adaptive Control System for Detecting Computer Attacks on Objects of Critical Information Infrastructure V. M. KrundyshevM. O. Kalinin OriginalPaper 28 February 2023 Pages: 1040 - 1048